Societal vulnerability to computer system failures
暂无分享,去创建一个
[1] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[2] Eric J. Novotny,et al. Resiliency of the computerized society , 1983, AFIPS '83.
[3] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.
[4] James Marting,et al. Security, Accuracy, and Privacy in Computer Systems , 1973 .
[5] Nancy G. Leveson,et al. Analyzing Safety and Fault Tolerance Using Time Petri Nets , 1985, TAPSOFT, Vol.2.
[6] Adele Goldberg. ACM President's letters , 1985, CACM.
[7] Willis H. Ware,et al. Information systems security and privacy , 1984, CACM.
[8] Lance J. Hoffman,et al. Modern methods for computer security and privacy , 1973 .
[9] Lance J. Hoffman,et al. Impacts of information system vulnerabilities on society , 1899, AFIPS '82.
[10] Stephen T. Walker. The advent of trusted computer operating systems , 1980, AFIPS '80.
[11] Lawrence Robinson,et al. Proof techniques for hierarchically structured programs , 1977, CACM.
[12] Rob Kling,et al. Value conflicts and social choice in electronic funds transfer system developments , 1978, CACM.
[13] Jonathan K. Millen,et al. Verifying Security , 1981, CSUR.
[14] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[15] David H. Brandin. ACM president's letter: the horse or the herring , 1982, CACM.
[16] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[17] M. Granger Morgan. Computer-Based National Information Systems: Technology and Public Policy Issues , 1982 .
[18] Ralph Howard,et al. Data encryption standard , 1987 .